Alexandr Kuznetsov

Orcid: 0000-0003-2331-6326

According to our database1, Alexandr Kuznetsov authored at least 72 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Image steganalysis using deep learning models.
Multim. Tools Appl., May, 2024

Optimized simulated annealing for efficient generation of highly nonlinear S-boxes.
Soft Comput., March, 2024

A new cost function for heuristic search of nonlinear substitutions.
Expert Syst. Appl., March, 2024

SBGen: A high-performance library for rapid generation of cryptographic S-boxes.
SoftwareX, 2024

Image-GS: Content-Adaptive Image Representation via 2D Gaussians.
CoRR, 2024

Hybrid Rendering for Dynamic Scenes.
CoRR, 2024

N-Dimensional Gaussians for Fitting of High Dimensional Functions.
CoRR, 2024

2023
Generation of Nonlinear Substitutions by Simulated Annealing Algorithm.
Inf., May, 2023

Hiding data in vector images: software implementation and experimental research.
Multim. Tools Appl., April, 2023

2022
Photon-Driven Neural Reconstruction for Path Guiding.
ACM Trans. Graph., 2022

Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
Sensors, 2022

Direct Spread Spectrum Technology for Data Hiding in Audio.
Sensors, 2022

Designing of fault-tolerant computer system structures using residue number systems.
Open Comput. Sci., 2022

Rendering Neural Materials on Curved Surfaces.
Proceedings of the SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference, Vancouver, BC, Canada, August 7, 2022

Codes for Multiple-Access Asynchronous Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Residual classes based mathematical model of the computer system's reliability.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Stream Ciphers in Modern Real-time IT Systems - Analysis, Design and Comparative Studies
375, Springer, ISBN: 978-3-030-79769-0, 2022

2021
Hierarchical neural reconstruction for path guiding using hybrid path and photon samples.
ACM Trans. Graph., 2021

NeuMIP: multi-resolution neural materials.
ACM Trans. Graph., 2021

Full Non-Binary Constant-Weight Codes.
SN Comput. Sci., 2021

Elliptic Curve Pseudorandom Bit Generator with Maximum Period Sequences.
Int. J. Comput., 2021

Convolutional Neural Networks to Protect Against Spoofing Attacks on Biometric Face Authentication.
Proceedings of the Digital Transformation, 2021

Hiding Messages in Audio Files Using Direct Spread Spectrum.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Performance Evaluation of the Classic McEliece Key Encapsulation Algorithm.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Investigation of the Correlation Properties of Spreading Sequences for Asynchronous CDMA.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications".
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Message Concealing in Vector Images.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Fault Tolerance Computer System Structures Functioning in Residue Classes.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Data Hiding in Vector Images.
Proceedings of the IEEE 16th International Conference on Computer Sciences and Information Technologies, 2021

Particle Swarm Optimization based on S-Boxes Generation.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Design of a Residual Adder in Computer Systems (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Method of Diagnostic of Non-Positional Code Structures in the System of Residue Classes Basing on the Usage of an Alternative Number Set Informativeness.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

2020
Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register.
Int. J. Comput., 2020

Editorial "Computational Aspects of Critical Infrastructures Security", "Security and Post-quantum Cryptography".
Int. J. Comput., 2020

Photon-Driven Neural Path Guiding.
CoRR, 2020

Cryptographically Properties of Random S-Boxes.
Proceedings of the 16th International Conference on ICT in Education, 2020

New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences.
Proceedings of the 16th International Conference on ICT in Education, 2020

Non-Binary Constant Weight Coding Technique.
Proceedings of the 16th International Conference on ICT in Education, 2020

Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Steganography.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

New Approach to the Implementation of Post-Quantum Digital Signature Scheme.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Determination of Positional Characteristics of Numbers in the Residual Class System.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Techniques for Raising the Remainder to a Power in the System of Residual Classes.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Extrapolation to calculate the probability of a double spending attack.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

Hiding data in cover images using a pseudo-random sequences.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

The analysis of the methods of data diagnostic in a residue number system.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

The data errors control in the modular number system based on the nullification procedure.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

Decentralized electronic voting system based on blockchain technology developing principals.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

Data Hiding Scheme Based on Spread Sequence Addressing.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

Algorithms for Determining Residues Modulo in a Complex Numerical Domain.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

2019
Learning generative models for rendering specular microgeometry.
ACM Trans. Graph., 2019

Heuristic Methods for the Design of Cryptographic Boolean Functions.
Int. J. Comput., 2019

Opportunities to minimize Hardware and Software Costs for Implementing Boolean Functions in Stream Ciphers.
Int. J. Comput., 2019

Noise Immunity of the Algebraic Geometric codes.
Int. J. Comput., 2019

Studies on Statistical Analysis and Performance Evaluation for some Stream Ciphers.
Int. J. Comput., 2019

Information Hiding Using 3D-Printing Technology.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Side Channel Attack on a Quantum Random Number Generator.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Code-Based Schemes for Post-Quantum Digital Signatures.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom Sequences.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Pseudorandom Sequences for Spread Spectrum Image Steganography.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Discrete Signals with Special Correlation Properties.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Automated Software Vulnerability Testing Using In-Depth Training Methods.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Methods for Comparing Numbers in Non-Positional Notation of Residual Classes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Method of Data Control in the Residue Classes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Statistical Testing of Blockchain Hash Algorithms.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

2018
Deep Adaptive Sampling for Low Sample Count Rendering.
Comput. Graph. Forum, 2018

Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images.
Proceedings of the Second International Conference on Data Stream Mining & Processing, 2018

2017
Multiple Axis-Aligned Filters for Rendering of Combined Distribution Effects.
Comput. Graph. Forum, 2017

Diagnostics of Functional State and Reserve Capacity of Young Athletes' Organism.
Proceedings of the 5th International Congress on Sport Sciences Research and Technology Support, 2017

2008
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields.
IACR Cryptol. ePrint Arch., 2008

The Design of Boolean Functions by Modified Hill Climbing Method.
IACR Cryptol. ePrint Arch., 2008


  Loading...